General

  • Target

    JaffaCakes118_e6868219c5cf3cc5bb04c31613dc2efc36914d329b1fa04d1164d5cde1f07913

  • Size

    6.6MB

  • Sample

    241222-htk5wsykhx

  • MD5

    285fd1c88a21ed95a7de0e1f40ec6eb9

  • SHA1

    c7e901069ec94bcfd32ab01f418ee357ad110053

  • SHA256

    e6868219c5cf3cc5bb04c31613dc2efc36914d329b1fa04d1164d5cde1f07913

  • SHA512

    3621f4aaca9f6971674212655c1e9bb0dabe2f3ee0dff01c43fe7c10f76acdfc50596f0ec5b522c983aa4510a687c706a705e0c1737ee91f11b8880089b71095

  • SSDEEP

    196608:JmDsD3mItyvWAyN8HjO9nBuCcCgdTaUxztT:JFDWIv+VCcCg0yzR

Malware Config

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Targets

    • Target

      e12ec9871450a8052f6bb79066950faa5c1e3d1490884e07e345be9d1608e4fd

    • Size

      10.3MB

    • MD5

      8c461c7cf6bec9a8b48f68c4ab4bdf2d

    • SHA1

      bebe51ce9da26fb9c5fcce2e1dfb16424d829a85

    • SHA256

      e12ec9871450a8052f6bb79066950faa5c1e3d1490884e07e345be9d1608e4fd

    • SHA512

      0cb135b0a9a8d0771ba453b3456a0941135437fb2adbc20f6ee38174c62474e4710b33c0d36d5508df0faae9411377b74390ddb32edb28289f11592282a20f4f

    • SSDEEP

      49152:/ppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppt:

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks